ruchikagargdiwakar / ml_cyber_security_usecasesLinks
This project contains files for cyber security
☆36Updated 7 years ago
Alternatives and similar repositories for ml_cyber_security_usecases
Users that are interested in ml_cyber_security_usecases are comparing it to the libraries listed below
Sorting:
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆73Updated 6 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆98Updated 2 years ago
- NLP model and tech for cyber security tasks☆87Updated 2 years ago
- This is a paper list about Machine Learning for IDSes☆90Updated last year
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆216Updated last year
- ☆38Updated last year
- Extracting Attack Behavior from Threat Reports☆80Updated 2 years ago
- ☆84Updated 2 years ago
- Detection of malicious domain names using machine learning and deep learning models☆16Updated 7 years ago
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆175Updated 2 years ago
- [IEEE S&P Workshop 2018] "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware" Abdullah Al-Dujaili, Alex Huang, Erik…☆109Updated last year
- A logic-based enterprise network security analyzer☆135Updated 2 years ago
- Scripts to deploy virtual testbed for log data analysis and anomaly detection.☆27Updated 2 years ago
- A machine learning based Intrusion Detection System☆159Updated 6 years ago
- adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants☆57Updated 2 years ago
- Feature extraction for CERT insider threat test dataset☆106Updated last year
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆40Updated last year
- Public datasets to help you address various cyber security problems.☆461Updated 3 years ago
- [AdvML@KDD 2019] Robust Malware Detection Challenge☆17Updated 6 years ago
- ☆25Updated 4 years ago
- Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine for Malware Classification☆173Updated 2 years ago
- Material from the DARPA Transparent Computing Program☆221Updated 5 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆255Updated 4 years ago
- Adversarial Malware Generator Using GANs☆55Updated last year
- Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications☆145Updated 2 years ago
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆69Updated 2 years ago
- Malware Classification using Machine learning☆74Updated last year
- Cyber Attack Detection thanks to Machine Learning Algorithms☆105Updated 5 years ago
- Transfer Learning for Image-Based Malware Classification☆46Updated 3 years ago
- FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data☆29Updated 3 years ago